A Study of Multi Level Security Access Mechanism on Military Information Network

碩士 === 國防管理學院 === 國防資訊研究所 === 88 === MultiLevel Security(MLS) is a capability that allows information with different sensitivities to be simultaneously stored and processed in an information system with users having different security clearances, authorizations. It's a significant technology fo...

Full description

Bibliographic Details
Main Authors: Li-yung Sun, 孫立勇
Other Authors: 伍台國
Format: Others
Language:zh-TW
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/52227430011411679107
Description
Summary:碩士 === 國防管理學院 === 國防資訊研究所 === 88 === MultiLevel Security(MLS) is a capability that allows information with different sensitivities to be simultaneously stored and processed in an information system with users having different security clearances, authorizations. It's a significant technology for command, control, communications, and intelligence systems because it enhances the availability of information while maintaining security. Anonymous connection is also an important technique to Information Warfare, because in a packet switched network, packets have a header used for routing, and a payload that carries the data. The header, which must be visible to the network (and to observers of the network), reveals the source and destination of the packet. Even if the header were obscured in some way, the packet could still be tracked as it moves through the network. Encrypting the payload is similarly ineffective, because the goal of traffic analysis is to identify who is talking to whom and not (to identify directly) the content of that conversation. This thesis discusses how will we use Onion Routing anonymous connection over MultiProtocol Label Switching(MPLS) network which will be the future infrastructure of Military Information Network(MINET) because of its flexible, scalable, bi-directional, real-time, and efficient. We will discuss how to use this infrastructure meet the Multilevel Security requirement. By using dynamic link cryptosystem, we believe that it can effectively resistant to both eavesdropping and traffic analysis.